refactor(deployment): Remove WireGuard VPN dependency and restore public service access
Remove WireGuard integration from production deployment to simplify infrastructure: - Remove docker-compose-direct-access.yml (VPN-bound services) - Remove VPN-only middlewares from Grafana, Prometheus, Portainer - Remove WireGuard middleware definitions from Traefik - Remove WireGuard IPs (10.8.0.0/24) from Traefik forwarded headers All monitoring services now publicly accessible via subdomains: - grafana.michaelschiemer.de (with Grafana native auth) - prometheus.michaelschiemer.de (with Basic Auth) - portainer.michaelschiemer.de (with Portainer native auth) All services use Let's Encrypt SSL certificates via Traefik.
This commit is contained in:
11
deployment/wireguard/configs/.gitignore
vendored
Normal file
11
deployment/wireguard/configs/.gitignore
vendored
Normal file
@@ -0,0 +1,11 @@
|
||||
# WireGuard Client Configurations
|
||||
# These contain private keys and should NEVER be committed!
|
||||
|
||||
*.conf
|
||||
*.key
|
||||
*.qr.txt
|
||||
*.qr.png
|
||||
|
||||
# Allow README
|
||||
!README.md
|
||||
!.gitignore
|
||||
47
deployment/wireguard/configs/README.md
Normal file
47
deployment/wireguard/configs/README.md
Normal file
@@ -0,0 +1,47 @@
|
||||
# WireGuard Client Configurations
|
||||
|
||||
This directory stores generated client configuration files.
|
||||
|
||||
## Security Notice
|
||||
|
||||
⚠️ **NEVER commit client configs to Git!**
|
||||
|
||||
Client configs contain:
|
||||
- Private keys
|
||||
- Preshared keys
|
||||
- Network topology information
|
||||
|
||||
`.gitignore` is configured to exclude all `.conf`, `.key`, `.qr.txt`, and `.qr.png` files.
|
||||
|
||||
## Generate New Client
|
||||
|
||||
```bash
|
||||
cd ../../scripts
|
||||
sudo ./generate-client-config.sh <device-name>
|
||||
```
|
||||
|
||||
Configs will be created here:
|
||||
- `<device-name>.conf` - WireGuard configuration
|
||||
- `<device-name>.qr.txt` - QR code (ASCII)
|
||||
- `<device-name>.qr.png` - QR code (PNG)
|
||||
|
||||
## Backup Client Configs
|
||||
|
||||
```bash
|
||||
# Securely backup configs (encrypted)
|
||||
tar -czf - *.conf | gpg --symmetric --cipher-algo AES256 -o wireguard-clients-backup-$(date +%Y%m%d).tar.gz.gpg
|
||||
```
|
||||
|
||||
## Revoke Client Access
|
||||
|
||||
```bash
|
||||
# On server
|
||||
sudo nano /etc/wireguard/wg0.conf
|
||||
# Remove [Peer] section for client
|
||||
|
||||
# Reload WireGuard
|
||||
sudo systemctl reload wg-quick@wg0
|
||||
|
||||
# Delete client config
|
||||
rm <device-name>.*
|
||||
```
|
||||
Reference in New Issue
Block a user